Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
bridge Vendor: adobe

About This Product

bridge is a software product developed by adobe, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 130 known vulnerabilities affecting adobe bridge. This includes 96 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2007 to 2026, indicating a sustained research interest and ongoing security attention. 22 medium-severity issues and 12 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2007-1279 2007-04-11 2025-04-09 - 7.2 Unknown
CVE-2015-3110 2015-06-24 2025-04-12 - 10.0 Likely
CVE-2015-3111 2015-06-24 2025-04-12 - 10.0 Likely
CVE-2015-3112 2015-06-24 2025-04-12 - 10.0 Likely
CVE-2020-9551 2020-03-25 2024-11-21 7.8 6.8 Likely
CVE-2020-9552 2020-03-25 2024-11-21 7.8 6.8 Likely
CVE-2020-9553 2020-06-26 2024-11-21 3.3 4.3 Likely
CVE-2020-9554 2020-06-26 2025-05-05 7.8 9.3 Likely
CVE-2020-9555 2020-06-26 2025-05-05 7.8 9.3 Likely
CVE-2020-9556 2020-06-26 2025-05-05 7.8 9.3 Likely
CVE-2020-9557 2020-06-26 2024-11-21 5.5 4.3 Likely
CVE-2020-9558 2020-06-26 2024-11-21 3.3 4.3 Likely
CVE-2020-9559 2020-06-26 2025-05-05 7.8 9.3 Likely
CVE-2020-9560 2020-06-26 2025-05-05 7.8 9.3 Likely
CVE-2020-9561 2020-06-26 2025-05-05 7.8 9.3 Likely
CVE-2020-9562 2020-06-26 2025-05-05 7.8 9.3 Likely
CVE-2020-9563 2020-06-26 2025-05-05 7.8 9.3 Likely
CVE-2020-9564 2020-06-26 2025-05-05 7.8 9.3 Likely
CVE-2020-9565 2020-06-26 2025-05-05 7.8 9.3 Likely
CVE-2020-9566 2020-06-26 2025-05-05 7.8 9.3 Likely
CVE-2020-9567 2020-06-26 2025-05-05 7.8 9.3 Likely
CVE-2020-9568 2020-06-26 2025-05-05 7.8 9.3 Likely
CVE-2020-9569 2020-06-26 2025-05-05 7.8 9.3 Likely
CVE-2020-9674 2020-07-22 2025-05-05 7.8 6.8 Likely
CVE-2020-9675 2020-07-22 2025-05-05 7.8 6.8 Likely
CVE-2020-9676 2020-07-22 2025-05-05 7.8 6.8 Likely
CVE-2021-21065 2021-02-25 2024-11-21 7.8 6.8 Likely
CVE-2021-21066 2021-02-25 2024-11-21 7.8 6.8 Likely
CVE-2021-21091 2021-04-15 2024-11-21 3.3 4.3 Likely
CVE-2021-21092 2021-04-15 2024-11-21 7.8 6.8 Likely
CVE-2021-21093 2021-04-15 2024-11-21 7.8 6.8 Likely
CVE-2021-21094 2021-04-15 2024-11-21 7.8 6.8 Likely
CVE-2021-21095 2021-04-15 2024-11-21 7.8 6.8 Likely
CVE-2021-21096 2021-04-15 2024-11-21 5.5 2.1 Unknown
CVE-2021-28624 2021-08-20 2024-11-21 7.8 9.3 Likely
CVE-2021-35989 2021-08-20 2024-11-21 7.8 9.3 Likely
CVE-2021-35990 2021-08-20 2024-11-21 7.8 9.3 Likely
CVE-2021-35991 2021-08-20 2024-11-21 3.3 4.3 Likely
CVE-2021-35992 2021-08-20 2024-11-21 3.3 4.3 Likely
CVE-2021-36049 2021-09-01 2024-11-21 7.8 9.3 Likely
CVE-2021-36059 2021-09-01 2024-11-21 7.8 9.3 Likely
CVE-2021-36067 2021-09-01 2024-11-21 7.8 9.3 Likely
CVE-2021-36068 2021-09-01 2024-11-21 7.8 9.3 Likely
CVE-2021-36069 2021-09-01 2024-11-21 7.8 9.3 Likely
CVE-2021-36071 2021-09-01 2024-11-21 3.3 4.3 Likely
CVE-2021-36072 2021-09-01 2024-11-21 7.8 9.3 Likely
CVE-2021-36073 2021-09-01 2024-11-21 7.8 9.3 Likely
CVE-2021-36074 2021-09-01 2024-11-21 3.3 4.3 Likely
CVE-2021-36075 2021-09-01 2024-11-21 7.8 9.3 Likely
CVE-2021-36076 2021-09-01 2024-11-21 7.8 9.3 Likely
CVE-2021-36077 2021-09-01 2024-11-21 5.5 4.3 Likely
CVE-2021-36078 2021-09-01 2024-11-21 7.8 9.3 Likely
CVE-2021-36079 2021-09-01 2024-11-21 7.8 9.3 Likely
CVE-2021-39816 2021-09-01 2024-11-21 7.8 9.3 Likely
CVE-2021-39817 2021-09-01 2024-11-21 7.8 9.3 Likely
CVE-2021-42725 2021-11-16 2024-11-21 7.8 6.8 Likely
CVE-2021-42733 2021-11-22 2024-11-21 5.5 4.3 Likely
CVE-2021-44185 2021-12-07 2024-11-21 3.3 4.3 Likely
CVE-2021-44186 2021-12-07 2024-11-21 3.3 4.3 Likely
CVE-2021-44187 2021-12-07 2024-11-21 3.3 4.3 Likely
CVE-2021-44743 2022-01-14 2024-11-21 7.8 9.3 Likely
CVE-2021-45051 2022-01-14 2024-11-21 3.3 4.3 Likely
CVE-2021-45052 2022-01-14 2024-11-21 3.3 4.3 Likely
CVE-2021-40750 2022-03-16 2024-11-21 5.5 4.3 Likely
CVE-2021-42533 2022-03-16 2024-11-21 7.8 6.8 Likely
CVE-2021-42719 2022-03-16 2024-11-21 7.8 6.8 Likely
CVE-2021-42720 2022-03-16 2024-11-21 7.8 6.8 Likely
CVE-2021-42722 2022-03-16 2024-11-21 7.8 4.4 Unknown
CVE-2021-42724 2022-03-16 2024-11-21 7.8 6.8 Likely
CVE-2021-42728 2022-03-16 2024-11-21 7.8 6.8 Likely
CVE-2021-42729 2022-03-16 2024-11-21 7.8 6.8 Likely
CVE-2021-42730 2022-03-16 2024-11-21 7.8 6.8 Likely
CVE-2022-28839 2022-06-15 2024-11-21 7.8 9.3 Likely
CVE-2022-28840 2022-06-15 2024-11-21 7.8 9.3 Likely
CVE-2022-28841 2022-06-15 2024-11-21 7.8 9.3 Likely
CVE-2022-28842 2022-06-15 2024-11-21 7.8 9.3 Likely
CVE-2022-28843 2022-06-15 2024-11-21 7.8 9.3 Likely
CVE-2022-28844 2022-06-15 2024-11-21 7.8 9.3 Likely
CVE-2022-28845 2022-06-15 2024-11-21 7.8 9.3 Likely
CVE-2022-28846 2022-06-15 2024-11-21 7.8 6.8 Likely
CVE-2022-28847 2022-06-15 2024-11-21 7.8 6.8 Likely
CVE-2022-28848 2022-06-15 2024-11-21 7.8 6.8 Likely
CVE-2022-28849 2022-06-15 2024-11-21 7.8 6.8 Likely
CVE-2022-28850 2022-06-15 2024-11-21 5.5 4.3 Likely
CVE-2022-35699 2022-09-19 2024-11-21 7.8 - -
CVE-2022-35700 2022-09-19 2024-11-21 7.8 - -
CVE-2022-35701 2022-09-19 2024-11-21 7.8 - -
CVE-2022-35702 2022-09-19 2024-11-21 7.8 - -
CVE-2022-35703 2022-09-19 2024-11-21 7.8 - -
CVE-2022-35704 2022-09-19 2024-11-21 7.8 - -
CVE-2022-35705 2022-09-19 2024-11-21 7.8 - -
CVE-2022-35706 2022-09-19 2024-11-21 7.8 - -
CVE-2022-35707 2022-09-19 2024-11-21 7.8 - -
CVE-2022-35708 2022-09-19 2024-11-21 7.8 - -
CVE-2022-35709 2022-09-19 2024-11-21 5.5 - -
CVE-2022-38425 2022-09-19 2024-11-21 5.5 - -
CVE-2023-21583 2023-02-17 2024-11-21 5.5 - -
CVE-2023-22226 2023-02-17 2024-11-21 7.8 - -
CVE-2023-22227 2023-02-17 2024-11-21 7.8 - -
CVE-2023-22228 2023-02-17 2024-11-21 7.8 - -
CVE-2023-22229 2023-02-17 2024-11-21 7.8 - -
CVE-2023-22230 2023-02-17 2024-11-21 7.8 - -
CVE-2023-22231 2023-02-17 2024-11-21 5.5 - -
CVE-2023-38216 2023-10-11 2024-11-21 5.5 - -
CVE-2023-38217 2023-10-11 2024-11-21 5.5 - -
CVE-2023-44327 2023-11-16 2024-11-21 5.5 - -
CVE-2023-44328 2023-11-16 2024-11-21 5.5 - -
CVE-2023-44329 2023-11-16 2024-11-21 5.5 - -
CVE-2024-20752 2024-03-18 2024-12-04 7.8 - -
CVE-2024-20755 2024-03-18 2024-12-04 7.8 - -
CVE-2024-20756 2024-03-18 2024-12-04 7.8 - -
CVE-2024-20757 2024-03-18 2024-12-04 5.5 - -
CVE-2024-20771 2024-04-11 2024-12-05 5.5 - -
CVE-2024-34139 2024-07-09 2024-11-21 7.8 - -
CVE-2024-34140 2024-07-09 2024-11-21 5.5 - -
CVE-2024-39386 2024-08-14 2024-08-19 7.8 - -
CVE-2024-39387 2024-08-14 2024-08-19 5.5 - -
CVE-2024-41840 2024-08-14 2024-08-19 7.8 - -
CVE-2024-45147 2024-11-12 2024-11-14 5.5 - -
CVE-2024-47458 2024-11-12 2024-11-14 5.5 - -
CVE-2024-53955 2024-12-10 2024-12-13 7.8 - -
CVE-2025-27193 2025-04-08 2025-05-05 7.8 - -
CVE-2025-43545 2025-05-13 2025-05-15 7.8 - -
CVE-2025-43546 2025-05-13 2025-05-15 7.8 - -
CVE-2025-43547 2025-05-13 2025-05-15 7.8 - -
CVE-2025-54268 2025-10-15 2025-10-17 7.8 - -
CVE-2025-54278 2025-10-15 2025-10-17 5.5 - -
CVE-2026-21283 2026-01-13 2026-01-14 7.8 - -
CVE-2026-21346 2026-02-10 2026-02-11 7.8 - -
CVE-2026-21347 2026-02-10 2026-02-11 7.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for adobe bridge by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.